SECURITY REVIEW OF SAFE PROPOSALS (U)
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP85-00966R000100030001-2
Release Decision:
RIPPUB
Original Classification:
C
Document Page Count:
28
Document Creation Date:
December 12, 2016
Document Release Date:
January 3, 2002
Sequence Number:
1
Case Number:
Publication Date:
April 10, 1978
Content Type:
MF
File:
Attachment | Size |
---|---|
CIA-RDP85-00966R000100030001-2.pdf | 866.05 KB |
Body:
Approved For Release 2B i,? }i,dd ^: DP85-00966Rbdb'~OcO3O Q1-2
rJ ,,
i.:r a7S d:s.
OCC-M-78- 164
MEMORANDUM FOR: Director of Data Processing
25X1A FROM
Chairman, OS/OC Security Review Committee
SUBJECT Security Review of SAFE Proposals (U)
1. (U/AIUO) Attached are the findings of the Security
25X1A Committee Review for the SAFE proposal's submitted by
It is the recommendation of the Security
Working Group that the BLACK system bus architecture be
selected for the SAFE program.
2. (C) The three key factors which impact the conclusions
and recommendations for the report are:
a. The totality of sensitive data on a RED bus,
b. The budgetary constraints for a labor intensive
on-going line surveillance program deemed essential for
a RED bus,
c. The advancement of the state-of-the-art
anticipated in the field of. microminiature technical
collection equipment.
.3. (U/AIUO) We, ODP/OC/OS, are entering the next
generation of information handling within the Agency and within
the Intelligence Community. It is imperative that crucial
decisions be made at the entry point to obviate the recognized
expense of retrofits.
25X1A
Attachment:
As Stated
E2, IMPDET CL BY: 390969
Approved For Release 21 / /3 ^GIA bP85-00966R000100030001-2
25X1A Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Next 3 Page(s) In Document Exempt
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
C :.! , i ! r ,I.; t I P.
SECURITY EVALUATION:
SAFE Communications
Architecture Reports
Approved For Reias940?Ak CIA-RDP85-00966R000100030001-2
STATINTL Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Next 3 Page(s) In Document Exempt
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
ca1 ~~IU A .;n.
SECURITY EVALUATION:
SAFE Communications
Architecture Reports
3 1 MAR 1978
Cry1t i -,r,F
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
CCt~FICrNT1M1.
EXECUTIVE SUMMARY
The Security Review Committee, comprised of Office
of Security and Office of Communications representatives,
have reviewed studies for the SAFE program.
The multi-discipline background of the members of this
committee run the gambit of Office of Security officers
with intimate experience and responsibilities for pro-
tecting the Agency's Information Systems and Classified
Information, with expertise in technical countermeasures
for wireline,protection; and Communications Security
officers who have the prime responsibility for protecting
the data flow of Agency information.
It is the position of this committee that the BLACK
communications architecture is necessary to protect the
information currently anticipated to be flowing within
this system.
This is based on an appraisal of the threat/risk
to the information. The classification level of infor-
mation and its sensitivity mandates the highest level of
protection. The difficulty of providing a high level of
security in a RED system, its estimated resource costs
both financial and human, long and short, further support
this position.
CUNFIf .1TIh.L
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
TABLE OF CONTENTS
I
i Executive Summary
I Introduction
A. Background
B. Objectives
II Threat and Vulnerability
III RED/BLACK Comparison
A. Prerequisites
B. Rationale
IV Costs
I A. General
B. Systems Cost Estimates
C. M Systems Cost Estimates
D. Resource Costs
V COMSEC Subsystem Developmental Risk
VI Future Utilization of the Bus
VII Deficiencies in Contractor Reports
VIII Conclusion and Recommendations
%wk
Approved For Release'-2b :01/30: CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
CC ,f!UENTI! 1
I. INTRODUCTION
This report provides a security evaluation of the
SAFE RED and BLACK communications architectures provided
25X1A by It contains recommendations for selection
of an a equate y secure architecture.
A. BACKGROUND
To fulfill the requirements of SAFE, an
unprecedented volume of data including Top Secret,
Sensitive Compartmented Information (SCI) and
Community proprietary material will be distributed
via a data communication system to approximately
users. A system which from the start appeared
able to handle SAFE's complex communication system
was the RF Bus Wide Band Communication System (WBCS).
This system was investigated by
under an ORD Feasibility Study, and has been adopted
as the design for SAFE. Although the WBCS has
numerous operational advantages, it requires high
level security protection because all data flows to
all points on the bus.
The concept of a communication trade-off study
was formulated at the time of the SAFE Request For
Proposal (RFP) to allow flexibility in providing the
required security protection for the SAFE data. Two
approaches were proposed: RED and BLACK. A plain
text RED system would rely heavily on physical
security devices and TEMPEST protection techniques.
A BLACK system would derive its security from
encryption. The contractors were directed to pursue
the design of both a RED and a BLACK architecture to
a point where meaningful comparisons could be made
by the Government and a preferred architecture chosen.
This point in time has now been reached.
Approved For Release 2002/01/301: CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
c it. 1 1,
E
11
i
B. OBJECTIVES
The objectives of the OS/COMSEC Working Group
were to evaluate both contractors' proposed systems
and their security features for security adequacy
and cost. In order to estimate the degree of
security required for the SAFE Communications
System and then determine how well the proposed
systems met these requirements, it was necessary
for the Working Group to first assess the threats
to which the SAFE Communications System would be
subjected. Next, the communications systems were
analyzed for vulnerabilities in their designs. .
Costs included not only one-time costs of designing
and implementing the security features, but also
the continuing costs and manpower requirements to
sustain the required security protection. Finally,
security countermeasures had to be identified to
correct the weaknesses in an acceptable manner.
{ir~}:' ;L
2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
25X1A Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Next 1 Page(s) In Document Exempt
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
dui Ei T A
1
III. RED/BLACK COMPARISON
A. PREREQUISITES
There are certain prerequisites that must be
considered before addressing the two types of
architectures, RED and BLACK. These are minimum
standards which must be met by any system which
is installed.
1. It is a requirement that high grade
cryptographic key generators be used to
protect inter-building links.
2. If a RED system is installed, the
Security Standards for Classified Plain
Text Distribution in the Headquarters
Building and the Security Standards for
Classified Plain Text Distribution in
Outside Buildings must be adhered to.
Also, NACSEM 5100 requirements (TEMPEST)
must be met for all terminals and the
cable distribution system.
3. If a BLACK architecture is implemented
a high grade cryptographic algorithm must
be used in the cryptographic module (CM)
in a cost effective manner. This is
feasible by the omission of certain alarms,
checks, and security failure analysis.
The TEMPEST requirements imposed by Chapter
6 of KAG-30 will be applied to the CM.
NACSEM 5100 requirements will be applied
to the BLACK terminals. MIL-STANDARD 461
requirements will be applied to the cable
distribution system.
j i.i3i g
5
Approved For Release 2002/01/30 CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
B. RATIONALE
The rationale for the evaluation of the
proposals was to determine what security protection
is required for various types of installations and
then ascertain what approved countermeasures could
be used to reduce the degree of risk to an
acceptable level. Only those techniques presently
employed by the Office of Security were considered
since no new-physical security techniques were
addressed by either contractor.
For the RED installation, all BIU's, amplifiers,
splitters and taps must be locked and alarmed. In
addition, the terminals must be locked to prevent
unauthorized access to the system. The possibility
of constructing special purpose vaults to protect
the rooms which house terminals vice alarming
individual terminals was investigated and the cost
was found to be prohibitive. The idea of placing
the terminals in safes, as is presently done for
some cryptographic systems, was also considered and
found to be too expensive in addition to being
inconvenient for the operator. We concluded that
individual alarms were cost effective and included
only the minimum number of alarms necessary to
isolate a problem to a reasonably small physical
area ensuring an acceptable alarm response time.
This approach provides security protection while
allowing the SAFE operators to work in a standard
office environment.
For the BLACK installation, only the crypto-
graphic module and terminal must be protected. For
simplicity of installation it is recommended that
the CM be integrated into the terminal or work
station. The required protection for the CM and
terminal in a BLACK System is a strengthened
cabinet and lock.
For a BLACK System, the Automatic Key
Distribution Center (AKDC) and the other centralized
cryptographic functions must be in a privacy area
within the computer center, which will meet the
criteria for a Special Purpose Vault. Another require-
ment on the AKDC is that nobody is allowed in the
area alone; also referred to as two-man control.
' 6
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
CONFIDENTIAL
IV. COSTS
A. GENERAL
For the purpose of evaluating the costs
associated with either a RED or BLACK communications
architecture one must look not only at the systems
costs presented by the two contractors, but also
the added costs of providing the requisite security
protection for the system. The following is an
analysis of the added security hardware costs and
resource impact for meeting requisite security
protection.
B. SYSTEMS COST ESTIMATES
The _ System architecture is configured so
that the bus runs only as far as the electrical
closets where the BIU and cluster units are
located. The data is then distributed to each work
station via individual twisted pair cabling. It
should be noted that only the data to and from an
individual terminal is available to an intruder on
each pair of twisted wire. The security protection
required is, thus, similar to that provided today.
Table 1 enumerates the items that require protection,
indicates the quantity of devices to be protected,
and designates the security measures and the associated
costs for both the RED and BLACK systems. Table 2
provides the computation data for the added physical
and technical security protection required for the
G.E. RED system. Table 3 provides the computation
data for similarly protecting the ~ BLACK system.
It should be noted that the quantities used were
based on information provided by the contractor and
the experience of the working group. No security
costs for outside buildings have been included in
this cost estimate. The unit cost of physical and
technical security protection in outbuildings may be
higher than that required in the Headquarters
environment.
CCE 1141 - ?TIa.l
Approved For Release 2002/01/34: CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
25X1A
HARDWARE COST OF SECURITY MEASURES FOR ~ SYSTEM
ITEM BEING SECURED
QUANTITY
SECURITY MEASURE
1.
Single 1/0 Device
SAFE Terminal
1663
Cabinet lock and increased strength of
Regional Printer
121
cabinet
ADSTAR Terminal
900
Contact s
witch alarm in existing elect.
BIU or BIU Extenders
45
closet wi
monitor
Cabinet L
th twisted shielded pair to a
ock
3.
Workstation Cluster
N/A
4.
Splitter Tap
95
18
5.
Coaxial Bus Amplifiers
enclosure
2
6.
Coaxial Cable Pullbox
41
7.
Twisted Pair From
BIU to I/O Device
N/A
N/A, since BIU's located in closets
Contact switch alarm in existing elect.
closet with twisted shielded pair to a
monitor
Cabinet Lock
Contact switch alarm in existing elect.
closet with twisted shielded pair to a
monitor
Cabinet Lock
UNIT COST
RED BLACK
$ 100
$100
100
20
ITO
0
0
? 0
100
0
100
Contact switch alarm outside existing elect.1350
elect closet with a twisted shielded pair
to a monitor
Cabinet Lock
N/A twisted pair in floor cells will not
require additional costs 0 0
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Next 1 Page(s) In Document Exempt
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
C NFIUUITIAL
C. _ SYSTEMS COST ESTIMATE
The _ system architecture is configured so
that the bus runs all the way to the BIU which
will be located in the work station area. The
transmission path is coaxial cable. This necessitates
providing protection for-the system wherever the bus
data is available to an intruder. Table 4 enumerates
the items that require protection, indicates the
quantity of devices to be protected, and designates
the security measures and the associated costs for
both the RED and BLACK systems. Table 5 provides
the computation data for the added physical and 25X1A
technical security required to protect the M RED
system. Table 6 provides the computation data for
similarly protecting the _ BLACK system. It should 25X1A
be noted that the quantities used were based on
information provided by the contractor and the exper-
ience of the working group. No security costs for
outside buildings have been included in this cost
estimate. The unit cost of physical and technical
security protection in outbuildings may be higher
than that required in the Headquarters environment.
8
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
pu NF ETIAL
ITEM BEING SECURED
170 Device
25X1A
HARDWARE COST OF SECURITY MEASURES FOR -_SYSTEM
UNIT COST
QUANTITY SECURITY MEASURE RED BLACK
SAFE Terminal 1663
Regional Printer 158
ADSTAR 900
Regional Printer + BIU 158
SAFE Terminal + BIU 332
ADSTAR + BIU 900
Cabinet lock & increased cabinet strength $ 100 $100
Contact switch alarm outside existing 1350
elect. closet w/TSP to a monitor
Cabinet Lock
0
13 00 100
3. Workstation Cluster + BIU
600@4:1RATI0 998/4 = 250 Contact switch alarm for each cluster 1500
20%@2:1RATI0 333/2 = 167 series w/TSP to a monitor
Cabinet Lock
4. Splitter Tap
Contact switch alarm from outside
elect. closet.. w/TSP to a monitor
Cabinet Lock
20 100
1520 100
100 0
20 0
120
___
existing _
1350 0
20 0
136 0
S. Elect. closet IDF and contact switch alarm from existing
floor cell entry cover 70 elect. closet w/TSP to a monitor 100 0
20
Cabinet Lock
120
. Pull ox 41 Contact switch alarm for outside 1350
existing elect. closet w/TSP to a monitor
Cabinet Lock 20
13
30 Contact switch alarm FM
1500 existing elect-closet w/TSP to a monitor
Cabinet Lock
Floor cell covers 2000 Buy new covers to replace presently
missing covers 40
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Next 1 Page(s) In Document Exempt
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
V iii 1BE T 1 M
t
25X1A
25X1A
D. RESOURCE COSTS
The required resource allocation for a security
surveillance program can vary widely depending on the
level of effort. In order to illustrate the range
of costs, the resource costs were divided into two
categories - a maximum effort and a minimum effort.
1. Maximum Effort
Technical Inspection - For a RED environment,
if the Office of Security inspects every I/O
device once a year, it is estimated that it would
take 12 man-years of effort to inspect the SAFE
system. This is based on an estimated 8 hours to
inspect an I/O device and its associated wiring.
It is estimated that for a RED scenario, it will
take 10 man years to provide an alarm monitor and
response program capability. For a BLACK system,
it will take 5 man-years to monitor the security
console. In addition, the present annual
maintenance costs for alarms and associated
wiring is $31.2/alarm per ear. It'is estimated
that these costs for the iW RED system will be
$6,300 and the the _ RED system will be $107,600.
These costs are not reflected on any table.
TEMPEST Inspection - If the Office of
Communications TEMPEST-inspects every I/O device
once a year, it is estimated that it would take
24 man-years of effort to inspect the SAFE system.
This is based on a two-man team inspecting one
I/O device per day and two electrical closets per
day.
2. Minimum Effort
Technical Inspection - For a RED environment,
if the Office of Security checks only the conduit
runs and maintains alarms it is estimated that 3
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2'
11
GO rI ENTIAL
man-years of effort would be required. It is
estimated that for a RED scenario it will take
10 man-years to provide an alarm monitor and
response program capability. For a BLACK system
it will take 5 man-years to monitor the security
console. In addition, the present annual
maintenance costs for alarms and associated
25X1A
wiring is $31.2/alarm per ear. It is estimated
r RED
ill b
t
em w
e
sys
that these costs for the
25X1A
$6,300 and the = RED system will be
These costs are not reflected on any
$107,600.
table.
TEMPEST Inspection - If the Office of
Communications TEMPEST-inspects the 70
electrical closets annually and 10% of the I/O
devices annually, it is estimated that 2 man-
years of effort would be required.
Approved For Release 2002/01/360 CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
CgkjFjDr,
1'4 ufflAl
V. COMSEC SUBSYSTEM DEVELOPMENTAL RISK
The development schedule provided in the .
architecture document is confirmed as realistic. The
schedule could be tightened, exposing the system to a
higher degree of risk, but this does not appear
necessary or desireable. NSA hopes to begin development
of the COMSEC Subsystem in early FY-79. This will allow
NSA to develop a CM which could be common to a variety
of systems. This has several advantages to the SAFE
program: lower unit cost, minimum development cost,
security protection, and interoperability with other
intelligence networks, and a development schedule
approximately 9 months to 1 year earlier than required.
The performance risk is considered low. A
significant risk item is the 9600 bps throughput
required of the CM. However, this risk is minimized by
the following:
A. There is a .moderate risk in meeting the
requirement with current day technology in
microproce-ssors.
B. If the new higher speed microprocessors
announced by manufacturers meet their claims,
NSA can meet the requirement with ease.
C. Alternative cryptologic devices exist which
can meet the throughput requirement, however,
their employment would likely adversely effect
potential interoperability with other systems.
D. NSA could use any one of a number of existing
LSI cryptologic chips with microprocessor control
and easily exceed the system requirements.
However, the cost for each CM would probably rise
to about $500 and SAFE would likely lose potential
interoperability with other systems.
1
t.1 .i i'ti t ?-iy d ~.
11
Approved For Release 2002/01/30 CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
CCU FICO"ITIAt
The SAFE COMSEC Architecture is analogous to the
development program. - has been in
development since April 1977 and an operational testbed
should be installed in mid-1979. Most of the detailed
design and network protocols and procedures have already
been accomplished. The next year involves software
coding and equipment fabrication for the test. The only
direct fallout from to SAFE beyond the design
stage, is the high speed Key Generator Unit (KGU). The
remaining design and fabrication of thi.s.KGU is less
than one year from completion. Thus there are no
remaining "prerequisites" from except the KGIJ,
and that will be fabricated and demonstrated prior to a
SAFE contract award.
The most significant risk item in the COMSEC Sub-
system has to do with -its interface to.the SAFE System
components. Changes in the basic SAFE architecture,
once defined, must be fully coordinated with NSA to
determine their impact on NSA schedules.
Pv { :i!.-fi t w ' ..}-
Approved For Release 2002/01/3: CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
CONF1fE T I AL
VI. FUTURE UTILIZATION OF THE BUS
Since the analysis of the bus communications system
indicates that it will only be 40% utilized when SAFE is
fully operational, the remaining 60% capacity will be
utilized for other communications requirements. This
150% growth in the number of I/O devices which can be
connected to the bus. is extremely significant because
the same physical and technical secur.ity.p.roblems that
exist for the SAFE system will exist for any system that
utilizes the bus. This stems from the requirement to
protect the information appearing on the bus.
If a RED bus system is installed, all the security
features detailed in the cost section of the report
must be applied for each new I/O device.
If a BLACK bus system is installed, a CM and lock
will be the only security requirements for each I/O
device.
Approved For Release 2002/01/303: CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
GU Fif EMT1A
VII. DEFICIENCIES IN CONTRACTOR REPORTS
25X1A
25X1A
As expected, the two contractors made some
different assumptions in coming up with their RED/BLACK
presentations. Surprisingly, certain costs were
excluded in one case and not in the other. Certain
system sizing numbers were not consistent throughout.
It was therefore difficult to create a common base of
comparison..for the..candidate systems, particularly-
because the contractors were vague about itemizing
security related costs. Although some of the differences
could be resolved by assumed quantities to which unit
security costs could be applied, other component counts
were so imbedded in the contractors' submissions that unit
costs could not be assigned. To be specific:
A. Mexcluded the costs of physical security
devices in their RED presentation. Therefore,
the RED total cost was unrealistically low.
Furthermore, it was difficult to track the
distribution of system components so that
reasonable physical security unit costs could
be applied.
B. Although it was fully understood by the
Working Group that the RED/BLACK Security
Evaluation was not supposed to be a contractor
competition contractor design comes into play
because has a BIU associated with each
terminal and the coaxial bus extending to the
BIU, whereas _ has one BIU for many terminals
and terminates its bus in the electrical
closets. The Security Working Group recognizes
that part of the decision of the contractors for
BIU placement was based on individual interpre-
tations of what they were or were not permitted
to do by the Government. If operations or security
appears to advise a change, either contractor could
be instructed to switch to the other's approach.
Approved For Release 2002/01/3Q 4 CIA-RDP85-00966R000100030001-2.
Approved For Release 2002/01/30 CIA-RDP85-00966R000100030001-2
CONFIDENTIAL
Although not a part of the contractors' submissions,
Combined Project SAFE Office (CS.PO) background paper,
which included a communication system timetable, suggests
an apparent difficulty for the delivery of the BLACK
crypto subsystem. NSA confirmed on 23 March 1978 to the
CSPO there was no difficulty. The original NSA delivery
timetable was based on the dates previously supplied by
CSPO. If a new shorter timeframe can truly be achieved
by the contractors, then NSA can also advance its delivery.
This can be stated with some confidence. Work on the more
difficult building blocks of the BLACK COMSEC subsystem is
already well underway for other applications, quite inde-
pendent of SAFE. The SAFE contractors should be directed
to work out the integration of the subsystem to their
respective BLACK communications architecture.
It was noted as a deficiency of the CSPO timetable
and the contractors' reports that no mention of a testbed
timetable was made. Although a testbed period would be
part of the System Acquisition Phase (SAP), the lack of
reference to it in the CSPO timetable made it difficult
to determine the necessary delivery date for a BLACK
COMSEC Subsystem. The amount of time available to
resolve any problems anywhere in the communications
system which would first come to light in a functioning
system could also not be determined.
_ neglected to provide an integration design
figure to estimate support for a BLACK subsystem. It is
understood that they are working up these figures at the
present time.
It should be noted, as was stated by the NSA
consultant in the joint meeting with the CSPO Working
Group, that the costs of the BLACK COMSEC Subsystem were
in part, predicated on the need for a 10 Mbs data rate
per frequency slot. Subsequent contractor architecture
changes have resulted in a change from the 10 Mbs rate
to a 2 robs rate. As a result of this change, the costs
for the COMSEC Front End (CFE) and the Safe Key Generator
(SKG) should be greatly reduced.
It should be pointed out that -included costs for
a conduit in the BLACK Communication System price. This
is not a security requirement for a BLACK system. The
total should be adjusted accordingly before comparing any
total system costs.
?.i
ice` t~ii II, --~ `
Approved For Release 2002/01/31: CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
CQNF!CE13TIM-
VIII. CONCLUSION AND RECOMMENDATIONS
A. INTRODUCTION
The utilization of a.bus communication system
introduces a new dimension to the data communication
security problem. This dimension is the flow of all
system communications on a single cable throughout
the bus installation configuration. The potential
damage to the Agency and National Security from
- penetration of this bus for the information flowing,
mandates maximum security.
B. CONCLUSION
The two fundamental forms of communications
security RED and BLACK were compared. The following
conclusions are a result of this comparison:
1. The BLACK system provides absolute security
on an end to end basis for each identifiable
circuit within the bus; the RED system
provides a high degree of physical security
at the most vulnerable points only.
2. If Agency management accepts the higher
security vulnerability of a RED system
then management must recognize and accept:
a. The Risk
b. Added security hardware costs
c. Increased security revalidation and
maintenance resource costs
Approved For Release 2002/0'10 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
3. The security for bus expansion is easily
achieved in a BLACK system; security
costs are estimated at 50% lower than for
a RED system.
4. A factor not directly associated with the
SAFE communication system but which is
worthy of management consideration is the
potential influence on the Intelligence
Community of a BLACK selection.
C. RECOMMENDATIONS
It is the recommendation of the Security
Working Group that the BLACK system architecture
be selected.
It is further recommended that a coordinating
group be established to maximize the effectiveness
of the security features which are to be implemented
in the system.
17
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For Release 2002/01/30 : CIA-RDP85-00966R000100030001-2
Approved For RelOITIA-RDP85-009668000100030001-2